Patents by Inventor Ge Wen

Ge Wen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240131223
    Abstract: Some embodiments of the disclosure provide a decellularized heart valve (DHV) composite, a preparation method of the DHV composite, and a use of the DHV composite. In some examples, the preparation method of the DHV composite includes the following steps: S1, conducting a reaction I on a DHV with a copper chloride-dopamine hydrochloride mixed solution to obtain a copper ion-modified DHV; and S2, conducting a reaction II on the copper ion-modified DHV with a GDF11 solution to obtain the DHV composite. In other examples, the present disclosure provides a use of the DHV composite in preparation of a tissue-engineered heart valve (TEHV). In further examples, the TEHV is a heart valve (HV) with remodeling and regeneration capabilities.
    Type: Application
    Filed: August 2, 2023
    Publication date: April 25, 2024
    Applicant: UNION HOSPITAL TONGJI MEDICAL COLLEGE HUST
    Inventors: Nianguo DONG, Ying ZHOU, Weihua QIAO, Ge YAN, Shuyu WEN, Xing CHEN
  • Patent number: 11964937
    Abstract: A (methyl)acrolein oxidation catalyst and a preparation method therefor-in which the catalyst has a composition represented by the following formula: x(Mo12PaCsbVcDeOf)+tC/yZ in which Mo12PaCSbVcDeOf is a heteropolyacid salt main catalyst; C is a nano carbon fiber additive, and Z is a carrier thermal conduction diluent; Mo, P, Cs, V, and O represent the elements of molybdenum, phosphorus, cesium, vanadium, and oxygen, respectively; D represents at least one element selected from the group consisting of copper, iron, magnesium, manganese, antimony, zinc, tungsten, silicon, nickel, and palladium; a, b, c, e, and f represent the atomic ratio of each element, a=0.1-3, b=0.01-3, c=0.01-5, e=0.01-2, and f being the atomic ratio of oxygen required to satisfy the valence of each of the described components; x and y represent the weights of the main catalyst and the carrier thermal conduction diluent Z, and y/x=11.1-50%; and t represents the weight of the nano carbon fiber, and t/x=3-10%.
    Type: Grant
    Filed: January 17, 2019
    Date of Patent: April 23, 2024
    Assignee: Shanghai Huayi New Material Co., Ltd.
    Inventors: Xin Wen, Ge Luo, Xinlei Jin, Tonghao Wu, Yan Zhuang, Zhigang Qian, Xiaodong Chu
  • Patent number: 11954218
    Abstract: Embodiments of the present disclosure provide systems, methods, and apparatuses for addressing the above problems through the use of access rules that involve analyzing historical access request result data for various data elements individually and in combination over a predefined time interval. An automated determination can be made for whether a transaction can be authenticated based upon the historical access request result data (e.g., ultimately, deciding whether the data element or set of data elements are associated with a valid access request).
    Type: Grant
    Filed: February 8, 2021
    Date of Patent: April 9, 2024
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 11853110
    Abstract: Disclosed is a system to optimize rule weights for classifying access requests so as to manage rates of false positives and false negative classifications. A rules suggestion engine may suggest a profile of classification rules to a merchant for access requests. The system can optimize weights for the profile of rules using a cost function based on a training set of historical access requests, for example using stepwise regression or machine learning (ML). The system can compute a profile score based on the optimized weights, for example by summing the weights. The system statistically analyzes the profile score using classification thresholds and the historical access requests. The system can perform receiver operating characteristic (ROC) analysis for various threshold values, enabling a user to select a suitable threshold. The system can further optimize by adding or removing rules from the profile of rules.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: December 26, 2023
    Assignee: Visa International Service Association
    Inventors: Benjamin Scott Boding, Ge Wen
  • Patent number: 11722530
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Grant
    Filed: August 9, 2022
    Date of Patent: August 8, 2023
    Assignee: Visa International Service Association
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20230120503
    Abstract: Disclosed is a system to optimize rule weights for classifying access requests so as to manage rates of false positives and false negative classifications. A rules suggestion engine may suggest a profile of classification rules to a merchant for access requests. The system can optimize weights for the profile of rules using a cost function based on a training set of historical access requests, for example using stepwise regression or machine learning (ML). The system can compute a profile score based on the optimized weights, for example by summing the weights. The system statistically analyzes the profile score using classification thresholds and the historical access requests. The system can perform receiver operating characteristic (ROC) analysis for various threshold values, enabling a user to select a suitable threshold. The system can further optimize by adding or removing rules from the profile of rules.
    Type: Application
    Filed: December 21, 2022
    Publication date: April 20, 2023
    Applicant: Visa International Service Association
    Inventors: Benjamin Scott Boding, Ge Wen
  • Patent number: 11568075
    Abstract: Disclosed is a system to optimize rule weights for classifying access requests so as to manage rates of false positives and false negative classifications. A rules suggestion engine may suggest a profile of classification rules to a merchant for access requests. The system can optimize weights for the profile of rules using a cost function based on a training set of historical access requests, for example using stepwise regression or machine learning (ML). The system can compute a profile score based on the optimized weights, for example by summing the weights. The system statistically analyzes the profile score using classification thresholds and the historical access requests. The system can perform receiver operating characteristic (ROC) analysis for various threshold values, enabling a user to select a suitable threshold. The system can further optimize by adding or removing rules from the profile of rules.
    Type: Grant
    Filed: July 10, 2020
    Date of Patent: January 31, 2023
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Benjamin Scott Boding, Ge Wen
  • Publication number: 20220391478
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Application
    Filed: August 9, 2022
    Publication date: December 8, 2022
    Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 11451590
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Grant
    Filed: October 28, 2020
    Date of Patent: September 20, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 11443200
    Abstract: Described are a system, method, and computer program product for optimizing a predictive condition classification model and automatically enacting reactive measures based thereon. The method includes receiving event data representative of a plurality of events. The method also includes receiving the predictive condition classification model configured to categorize each event as satisfying a condition or not. The predictive condition classification model is configured to order the plurality of events by likelihood of satisfying the condition. The method includes generating a performance evaluation dataset and plotting data configured to cause a visual display to represent at least two model performance metrics of the performance evaluation dataset on a same output plot. The method includes automatically rejecting a top percent of the plurality of events for suspected satisfaction of the condition, determined at least partially from a customized rejection algorithm or a preset rejection algorithm.
    Type: Grant
    Filed: March 6, 2018
    Date of Patent: September 13, 2022
    Assignee: Visa International Service Association
    Inventors: Hung-Tzaw Hu, Benjamin Scott Boding, Ge Wen, Haochuan Zhou
  • Publication number: 20220012352
    Abstract: Disclosed is a system to optimize rule weights for classifying access requests so as to manage rates of false positives and false negative classifications. A rules suggestion engine may suggest a profile of classification rules to a merchant for access requests. The system can optimize weights for the profile of rules using a cost function based on a training set of historical access requests, for example using stepwise regression or machine learning (ML). The system can compute a profile score based on the optimized weights, for example by summing the weights. The system statistically analyzes the profile score using classification thresholds and the historical access requests. The system can perform receiver operating characteristic (ROC) analysis for various threshold values, enabling a user to select a suitable threshold. The system can further optimize by adding or removing rules from the profile of rules.
    Type: Application
    Filed: July 10, 2020
    Publication date: January 13, 2022
    Inventors: Benjamin Scott Boding, Ge Wen
  • Publication number: 20210248258
    Abstract: Embodiments of the present disclosure provide systems, methods, and apparatuses for addressing the above problems through the use of access rules that involve analyzing historical access request result data for various data elements individually and in combination over a predefined time interval. An automated determination can be made for whether a transaction can be authenticated based upon the historical access request result data (e.g., ultimately, deciding whether the data element or set of data elements are associated with a valid access request).
    Type: Application
    Filed: February 8, 2021
    Publication date: August 12, 2021
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20210044624
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Application
    Filed: October 28, 2020
    Publication date: February 11, 2021
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 10855685
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: December 1, 2020
    Assignee: Visa International Service Association
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Patent number: 10855726
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: December 1, 2020
    Assignee: Visa International Service Association
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20200175388
    Abstract: Described are a system, method, and computer program product for optimizing a predictive condition classification model and automatically enacting reactive measures based thereon. The method includes receiving event data representative of a plurality of events. The method also includes receiving the predictive condition classification model configured to categorize each event as satisfying a condition or not. The predictive condition classification model is configured to order the plurality of events by likelihood of satisfying the condition. The method includes generating a performance evaluation dataset and plotting data configured to cause a visual display to represent at least two model performance metrics of the performance evaluation dataset on a same output plot. The method includes automatically rejecting a top percent of the plurality of events for suspected satisfaction of the condition, determined at least partially from a customized rejection algorithm or a preset rejection algorithm.
    Type: Application
    Filed: March 6, 2018
    Publication date: June 4, 2020
    Inventors: Hung-Tzaw Hu, Benjamin Scott Boding, Ge Wen, Haochuan Zhou
  • Publication number: 20200120100
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Application
    Filed: October 15, 2018
    Publication date: April 16, 2020
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20200120135
    Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
    Type: Application
    Filed: October 15, 2018
    Publication date: April 16, 2020
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding
  • Publication number: 20180204215
    Abstract: A data structure provides reliable data allowing a security application to detect potential instances of fraudulent use of a payment account. The data structure can be generated using data elements associated with transactions from new authentication requests in a transaction. Once the data structure is generated, clusters within the data structure can be associated with legitimate authentication requests or potentially fraudulent authentication requests. A baseline cluster can be identified from the data structure and used to determine whether the new incoming authentication requests are legitimate or potentially fraudulent.
    Type: Application
    Filed: January 17, 2017
    Publication date: July 19, 2018
    Inventors: Hung-Tzaw Hu, Haochuan Zhou, Ge Wen, Benjamin Scott Boding